General

  • Target

    e3c4a3147e69b8f5c947d879fc4966cd69e5b5410a4aa86849432bb54875f3a8

  • Size

    313KB

  • Sample

    221123-h2l26aac3y

  • MD5

    6a5e516d794b02418ba59364d7c7d447

  • SHA1

    416c1eb095c709ebe011d4547e9ee29e08b97c5c

  • SHA256

    e3c4a3147e69b8f5c947d879fc4966cd69e5b5410a4aa86849432bb54875f3a8

  • SHA512

    b0fb0722c8aae122c11e32841ed72f315132ced9c5252e9692f0b52e9749c4f64b4eb302324bda653604c91c7c83384f2659b654b45c9b30825eaa2251e46c18

  • SSDEEP

    6144:nrb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoMH:nrRu6/eIo4t3PuFITKUAA

Score
7/10

Malware Config

Targets

    • Target

      e3c4a3147e69b8f5c947d879fc4966cd69e5b5410a4aa86849432bb54875f3a8

    • Size

      313KB

    • MD5

      6a5e516d794b02418ba59364d7c7d447

    • SHA1

      416c1eb095c709ebe011d4547e9ee29e08b97c5c

    • SHA256

      e3c4a3147e69b8f5c947d879fc4966cd69e5b5410a4aa86849432bb54875f3a8

    • SHA512

      b0fb0722c8aae122c11e32841ed72f315132ced9c5252e9692f0b52e9749c4f64b4eb302324bda653604c91c7c83384f2659b654b45c9b30825eaa2251e46c18

    • SSDEEP

      6144:nrb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoMH:nrRu6/eIo4t3PuFITKUAA

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks